Sciweavers

59 search results - page 9 / 12
» IRiSS - A Source Code Exploration Tool
Sort
View
ICSE
2009
IEEE-ACM
14 years 8 months ago
CloneDetective - A workbench for clone detection research
The area of clone detection has considerably evolved over the last decade, leading to approaches with better results, but at the same time using more elaborate algorithms and tool...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
PVLDB
2010
158views more  PVLDB 2010»
13 years 5 months ago
MEET DB2: Automated Database Migration Evaluation
Commercial databases compete for market share, which is composed of not only net-new sales to those purchasing a database for the first time, but also competitive “win-backs”...
Reynold Xin, Patrick Dantressangle, Sam Lightstone...
CONCURRENCY
2007
100views more  CONCURRENCY 2007»
13 years 7 months ago
An instrumentation technique for online analysis of multithreaded programs
Runtime verification of multithreaded systems, that is, the process of finding errors in multithreaded systems as they execute, is the theme of this paper. The major goal of the...
Grigore Rosu, Koushik Sen
ISSRE
2010
IEEE
13 years 6 months ago
Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian
Abstract—As smart phones grow in popularity, manufacturers are in a race to pack an increasingly rich set of features into these tiny devices. This brings additional complexity i...
Amiya Kumar Maji, Kangli Hao, Salmin Sultana, Saur...
CAV
2011
Springer
216views Hardware» more  CAV 2011»
12 years 11 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song